Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.1.1.2010.2112
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-2112-1)
Summary:The remote host is missing an update for the Debian 'bzip2' package(s) announced via the DSA-2112-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'bzip2' package(s) announced via the DSA-2112-1 advisory.

Vulnerability Insight:
Mikolaj Izdebski has discovered an integer overflow flaw in the BZ2_decompress function in bzip2/libbz2. An attacker could use a crafted bz2 file to cause a denial of service (application crash) or potentially to execute arbitrary code. (CVE-2010-0405)

After the upgrade, all running services that use libbz2 need to be restarted.

This update also provides rebuilt dpkg packages, which are statically linked to the fixed version of libbz2. Updated packages for clamav, which is also affected by this issue, will be provided on debian-volatile.

For the stable distribution (lenny), this problem has been fixed in version 1.0.5-1+lenny1.

For the testing distribution (squeeze) and the unstable distribution (sid), this problem in bzip2 will be fixed soon. Updated dpkg packages are not necessary for testing/unstable.

We recommend that you upgrade your bzip2 / dpkg packages.

Affected Software/OS:
'bzip2' package(s) on Debian 5.

Solution:
Please install the updated package(s).

CVSS Score:
5.1

CVSS Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-0405
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
Bugtraq: 20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console (Google Search)
http://www.securityfocus.com/archive/1/515055/100/0/threaded
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051366.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051278.html
http://security.gentoo.org/glsa/glsa-201301-05.xml
http://marc.info/?l=oss-security&m=128506868510655&w=2
http://www.redhat.com/support/errata/RHSA-2010-0703.html
http://www.redhat.com/support/errata/RHSA-2010-0858.html
http://secunia.com/advisories/41452
http://secunia.com/advisories/41505
http://secunia.com/advisories/42350
http://secunia.com/advisories/42404
http://secunia.com/advisories/42405
http://secunia.com/advisories/42529
http://secunia.com/advisories/42530
http://secunia.com/advisories/48378
SuSE Security Announcement: SUSE-SR:2010:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
http://www.ubuntu.com/usn/usn-986-1
http://www.ubuntu.com/usn/USN-986-2
http://www.ubuntu.com/usn/USN-986-3
http://www.vupen.com/english/advisories/2010/2455
http://www.vupen.com/english/advisories/2010/3043
http://www.vupen.com/english/advisories/2010/3052
http://www.vupen.com/english/advisories/2010/3073
http://www.vupen.com/english/advisories/2010/3126
http://www.vupen.com/english/advisories/2010/3127
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.